Category Archives: Uncategorized

Companies that offer advertising and marketing services and that work in retail and manufacturing industries must be cautious about Vega Stealer. The threat is specifically targeted at bigger companies that offer customer support, and whose contact emails are available publically. Based on the email address that is obtained, cyber criminals can create fictitious messages that allegedly address issues. If the recipient of such an email is tricked into believing that the message is real, they are likely to be tricked into opening an attachment file (Word Document) that is actually corrupted. ...

Gandcrab2 Ransomware can encipher a lot of different file types, so infecting your system with this malicious application might cause a lot of damage. The only safe way to get the affected files back is to replace them with copies from removable media devices, cloud storage, etc. The problem is, some users think about backup only when it is too late. Knowing this, cybercriminals who create threats like Gandcrab2 Ransomware target various personal files the user would not like to lose, e.g., photos, videos, text documents, and so on. ...

At first glance, it might seem that Radiospick.net is a trustworthy page that promotes a useful service; however, a team of researchers from 411-spyware.com has some doubts about its trustworthiness. According to them, there is a possibility that this website has been set up with the intention of obtaining some money from gullible computer users. Therefore, if you have found yourself on this website and cannot decide what to do, you should close Radiospick.net without mercy. We are sure you could find a better radio service for a lower price, so you should not start using the service promoted at Radiospick.net. ...

Servime.exe is a currency miner which gets on your computer unnoticed and consumes the computer's power to generate Monero coins. The Monero currency is among the most popular digital currencies, acquiring more and more interests from hackers and PC users alike. Everyone interested in mining coins can do so as long as no infringement on people's privacy is committed. Servime.exe could be categorized as a Trojan horse because it is installed surreptitiously, without the user's permission. The malicious program should be removed from the computer, and the removal should be carried out immediately to prevent undesirable consequences. ...

Startweblogic.exe is a malicious program that leverages the computer's power to mine the digital currency Bitcoin, one of the most expensive currency in the world. Once the currency miner Startweblogic.exe gets on the computer, it starts running in the background. The fact that this piece of malware is running on your PC shows that you should patch some security holds and pay more attention to your online security, especially when new forms of malware are creeping in. ...

Malware experts working at our internal labs have encountered numerous complaints about a site known as Lilplay. After conducting an extensive analysis of this web page and the services that it presents, our researchers have noticed that it could prove to be one more phishing site. Developers of this web site and service use it to make illegal profits from unsuspecting Internet users; they use a number of techniques, including illegal ones, to gain quick monetary reward from naive users without their knowledge or consent. ...

Critical Security Warning! Scam is a newly discovered tech support scam that claims that your Mac computer is under attack and that your privacy is jeopardized. The fact o the matter is that this scam was designed to convince you to call a fake tech support phone number and buy useless malware removal services and computer protection. We have found that this scam is shown to users by a potentially unwanted program that can be a standalone application or a browser extension. If you do not want to see this scam window, you have to delete the software that is redirecting you to its page. In this article, we will talk about how this scam is distributed, what it does, and how you can get rid of it. ...

Crypto-Loot Miner cannot be labeled as a dangerous threat to your system and, as you may also know, crypto-mining is still considered legal; well, sort of. As a matter of fact, we believe that when your PC is used by a third-party program to mine cryptocurrencies using your computer as a resource and all this without your permission or knowledge, such a program does commit a form of violation of privacy. Even if this miner may not use all your CPU power to do its mining, it can cause serious slowdowns, which can make your virtual experience annoying and disruptive. ...

Marlin.exe Siacoin GPU Miner is a tool that can be freely downloaded by anyone from the web. Originally, it is not a malicious application, but cyber criminals might also download it from the web and distribute it seeking to earn Siacoin, one of the digital currencies, using users’ computers resources. It is quite a challenge to detect it on the system because it does not have an interface, it is installed on users’ computers illegally, and, finally, it performs all its activities in the background. Of course, we do not say that it is impossible to find out about its entrance without a diagnostic antimalware tool. ...

Setli is promoted as an application that will allow you to access censored websites and protect your privacy. It modifies your system’s DNS settings to do that. However, we have found that it can also show ads and, in fact, showing ads is probably its primary objective. Therefore, we have classified this program as adware which means that it is highly unreliable and you ought to remove it. This program does not state that it shows ads explicitly, but this can be seen from its legal documents. Also, the ads it can show while you browse the web are potentially unreliable because there is no telling where they come from. ...